Here is a quick walkthrough on how to get started even if your ISP does not provide IPv6 natively yet.
- Register for an account with an IPv6 Tunnel Broker. I am using Hurricane Electric. Sign-up for a free account at www.tunnelbroker.net
- Once your registration is confirmed login to www.tunnelbroker.net and use the "Create Regular Tunnel" user function to allocate your IPv6 address space.
- Hurricane Electric (HE) will try to determine the closest of their POPs. You can manually override if required.
- In the "IPv4 endpoint (your side of the tunnel)" enter the public IP address of the WAN interface of the Fortinet. This of course works best when you have a static IP address. If your provider assigns you a dynamic IP address you will have to adjust your tunnel configuration on the HE website every time your IP changes. Most likely the IP address listed in "You are viewing from IP" will be your WAN IP.
- HE will now provide you with your tunnel details.
- config system sit-tunnel
- edit "HE" (the name you want to give to this tunnel/interface)
- set destination 216.218.224.42 (HE Server IPv4 address)
- set interface wan1 (the WAN interface of your firewall)
- set source 1.2.3.4 (the public IP address of your firewall that you specified above)
- set ip6 2001:x:x:x::2/64 (HE Client IPv6 address)
- end
HE will also assign you a /64 subnet for use behind the firewall on your network. For most people trying this at home 18,446,744,073,709,551,616 IP addresses should be plenty.
If you need more space than this, or as is more likely the case, more subnets you can select the "Assign /48 subnet" in the Tunnel Details page on the HE website. This will provide you with 65,536 subnets for internal use.
Now back to the Fortinet GUI. When you configured the sit-tunnel the name you assigned on the CLI will now show up as a firewall interface in the GUI.
Router -> Static Route -> Create New -> IPv6 Route
- Destination IP/Mask: ::/0 (the default route in IPv6 notation)
- Device: the tunnel interface you created earlier via the CLI (in my example "HE")
- Distance: 10
- Priority: 0
- Source Interface: internal
- Source Address: all
- Destination Interface: tunnel interface (in my example "HE)
- Destination Address: all
- Service: Any
- Action: Accept
- IPv6 Address: An address out of the "Routed /64" from the "HE Tunnel Details" page. For example if HE has assigned 2001:1234:4567:9999::/64 as your "Routed 64" your firewall internal IPv6 address could be 2001:1234:4567:9999:1::/64
Enjoy the holidays.
You can also enable stateless auto config of LAN clients using the pre-fix settings under the IPv6 interface on the FortiGate... in the CLI, use the commands:
ReplyDelete#conf sys int
# edit internal
# conf ip6-prefix-list
# edit 2001:1234:456:789::/64
# set autonomous-flag enable
# set onlink-flag enable
# set preferred-life-time 3600
# next
# end
# set ip6-send-adv enable
# end
# next
#end
Good morning, I'm trying to comunicate 2 pc's between Dmz1 and DMz2 each one with static ipv6 address. There is no ping response. Is there a special configuration for each interface?
ReplyDeleteEach interface is a Vlan.
Thanks for your help
Hi jlgb,
ReplyDeleteyou should probably post questions like this on the Fortinet support forum:
http://support.fortinet.com/forum
Andy: Thanks for your comment.
ReplyDeleteI did this:
upgrade to 4mr2
create policies for intervlan and other policy to allow Traffic from Internet to the DMZ.
Regards
hi,
ReplyDeletemaybe there is a little knot in my brain ..
i ´ve configured my 60d (FortiOS 5.2.1) like your post. i can´t see the interface in the gui. no problem. but how can i configure the clients for ipv6. the sample config on he is for win clients who has no fortigate in the front or?
br,
ronald